A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing Abstract-With the popularity of cloud computing, mobile devices can store/retrieve personal data from anywhere at any time. Consequently, the data security problem in mobile cloud becomes more and more severe and prevents further development of mobile cloud. There are sustantial studies that have been conducted…
A Load Balancing Model Based on Cloud Partitioning Abstract? A Load Balancing Model Based on Cloud Partitioning. Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. This article introduces a better load balance model for the public cloud…
A Load Balancing Model Based on Cloud Partitioning for the public cloud Abstract?A Load Balancing Model Based on Cloud Partitioning for the public cloud.Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more efficient and improves user satisfaction. < Final Year Projects > This…
A MAC Sensing Protocol Designfor Data Transmission with More Protection to Primary Users. Abstract?MAC protocols to sense channels for data transmission have been widely investigated for the secondary users to efficiently utilize and share the spectrum licensed by the primary user. One important issue associated with MAC protocols design is how the secondary users determine…
A Machine Learning Approach for Identifying Disease-Treatment Relations in Short Texts Abstract?The Machine Learning (ML) field has gained its momentum in almost any domain of research and just recently has become a reliable tool in the medical domain.< Final Year Project > The empirical domain of automatic learning is used in tasks such as…
A MapReduce-Based Nearest Neighbor Approach for Big-Data-Driven Traffic Flow Prediction Abstract? In big-data-driven trafc ow prediction systems, the robustness of prediction performance depends on accuracy and timeliness. This paper presents a new MapReduce-based nearest neighbor (NN) approach for trafc ow prediction using correlation analysis (TFPC) on a Hadoop platform. In particular, we develop a real-time…
A Mechanism Design Approach to Resource Procurement in Cloud Computing Abstract? A Mechanism Design Approach to Resource Procurement in Cloud Computing. We present a cloud resource procurement approach which not only automates the selection of an appropriate cloud vendor but also implements dynamic pricing. Three possible mechanisms are suggested for cloud resource procurement: cloud-dominant strategy…
A Mechanism Design Approach to Resource Procurement in Cloud Computing Abstract?A Mechanism Design Approach to Resource Procurement in Cloud Computing. We present a cloud resource procurement approach which not only automates the selection of an appropriate cloud vendor but also implements dynamic pricing. Three possible mechanisms are suggested for cloud resource procurement: cloud-dominant strategy incentive…
A Merge and Split Mechanism for Dynamic Virtual Organization Formation in Grids Abstract?A Merge and Split Mechanism for Dynamic Virtual Organization Formation in Grids. Executing large-scale application programs in grids requires resources from several grid service providers (GSPs). These providers form virtual organizations (VOs) by pooling their resources together to provide the required capabilities to…
A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction Abstract?A Method for Mining Infrequent Causal Associations and Its Application in Finding Adverse Drug Reaction. In many real-world applications, it is important to mine causal relationships where an event or event pattern causes certain < Final Year Projects > outcomes…
A Methodology for Direct and Indirect Discrimination Prevention in Data Mining. Data mining is an increasingly important technology for extracting useful knowledge hidden in large collections of data. There are, however, negative social perceptions about data mining, among which potential privacy invasion and potential discrimination. The latter consists of unfairly treating people on the basis…
A minimum enclosing ball-based support vector machine approach for detection of phishing websites Abstract?A novel approach based on minimum enclosing ball support vector machine (BVM) to phishing Website detection is proposed, which aims at achieving high speed and high accuracy for detecting phishing Website. In order to enhance the integrity of the feature vectors, we…